GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs

Size: px
Start display at page:

Download "GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs"

Transcription

1 IEEE th International Conference on Mobile Ad Hoc and Sensor Systems GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 96 {kangc, Abstract Delay Tolerant Networks (DTNs) have attracted significant interests due to the adaptability in areas without infrastructures. In such scenarios, moving data from one place (landmark) to another place (landmark) is essential for data communication between different areas. However, current DTN routing algorithms either fail to fully utilize node mobility or have additional requirements that cannot be satisfied easily (i.e., require base stations or the global traffic distribution). Therefore, in this paper, we propose a distributed greedy routing algorithm, namely GreedyFlow, for efficient packet routing between landmarks. GreedyFlow builds a local traffic map and a global landmark map on each node. The local traffic map indicates the node s knowledge about the amount of traffic (node transition) between landmarks in the area where it primarily visits. It is constructed by collecting encountered nodes transit frequencies between these landmarks. The global landmark map shows the distribution of landmarks in the system and is built offline. In packet routing, the global landmark map shows the general packet forwarding direction, while the local traffic map helps determine the next-hop landmark on the fastest path in the forwarding direction. As a result, packets are greedily forwarded toward their destination landmarks. Extensive real trace driven experiments demonstrate the high efficiency of GreedyFlow. I. INTRODUCTION In delay tolerant networks (DTNs) [], mobile nodes rely on the encountering to communicate with each other directly without infrastructures. Therefore, such a network structure is suitable for areas where infrastructures are costly to be built or are unavailable. In these scenarios, it is desirable to be able to forward packets from one place (landmark) to another place (landmark), i.e., packet routing between landmarks, to support many practical DTN applications. For example, people live in villages in a mountain area may wish to communicate with each other through their computers. However, it is costly to build infrastructures to interconnect them or enable satellite connection in each village. In this case, we can exploit the DTN consisting of mobile devices carried by people or vehicles moving in the area to transfer data between these villages []. We can also enable satellite connection in one village and rely on the DTN based packet routing between villages to enable the Internet connection for all villages. Though such a connection has a long delay, it is still useful for delay tolerant applications such as . Similarly, such a communication structure can be used to collect data from sensors attached to animals [] or deployed in mountain areas without infrastructures. Even in areas with infrastructures, it can be an effective backup scheme to support the dissemination of important messages in extreme scenarios such as disaster and outage []. Packet routing between landmarks in DTNs can be realized [] [7] by always forwarding a packet to the node that is more likely to move to its destination landmark. In other words, these methods rely on nodes that can frequently visit a packet s destination landmark to deliver the packet. Therefore, the mobility of nodes that rarely visit the destination landmark cannot help forward the packet. When the number of nodes that can frequently visit the destination landmark is limited, the packet routing efficiency is also limited. To solve this problem, some researchers have proposed to forward a packet along a sequence of landmarks (called landmark path) to better utilize node mobility for efficient packet routing between landmarks [] []. In each hop, the packet is carried by a node to move from current landmark to the next landmark in the path. With such a design, nodes moving between two consecutive landmarks on the landmark path can help forward the packet, even when these nodes rarely or never visit the packet s destination landmark. This means that node mobility is better utilized to forward packets. However, these methods require either base stations [], [9] or the global traffic distribution [] to calculate the optimal landmark path for each packet. Such requirements cannot be satisfied easily in real DTNs. First, due to the long delay in DTN routing, the global traffic information cannot be updated timely on each node. Second, in some DTN scenarios, such as battlefields and mountain areas, it is hard to build base stations. Such a limitation poses a significant challenge on realizing efficient packet routing between landmarks in DTNs. To solve the above challenge, we propose GreedyFlow, a distributed packet routing algorithm in DTNs. In GreedyFlow, to better utilize node mobility, packets are forwarded in a landmark-by-landmark manner. Each node maintains a global landmark map and a local traffic map (Figure ). The network is split into sub-areas, each of which is represented by a landmark. The global landmark map indicates the distribution of landmarks in the network and is built offline. The local traffic map reflects a node s knowledge about how frequently nodes transit between landmarks where it primarily visits. When a node meets another node, it collects the encountered node s transit frequencies between landmarks covered by its local traffic map to update the traffic map. The global landmark map and local traffic map are used to / $. IEEE DOI.9/MASS

2 Local traffic map L L L L... Fig. : Illustration of the design rationale. Des: L guide packet routing. The basic idea is to greedily forward a packet to a landmark closest to the destination landmark (called temporary destination landmark) within current packet holder s local traffic map. When a node (say N i ) receives a packet, it first determines the temporary destination landmark for the packet. Then, the node determines the fastest landmark path to the temporary destination landmark on its local traffic map and selects the next landmark on the path as the nexthop landmark. Next, N i forwards the packet to the node that is predicted to move to the selected next-hop landmark. For example, in Figure, for a packet destined to far-away landmark L, the node uses its global landmark map to identify the landmark that is closest to L, i.e., L, and uses the local traffic map to find the fastest path to L. With such a design, the packet is always forwarded to the landmark closest to the destination landmark through the fastest path based on local information. That is, packets are greedily forwarded toward their destination landmarks based on the two maps. In GreedyFlow, all packet forwarding decisions are made locally without the requirement of base stations or global traffic distribution. This is the major contribution of this work compared to previous works [] [] that also adopt landmark based relay. In summary, the contributions of this paper include We propose a distributed traffic map generation method, which enables each node to learn the node transition frequencies between landmarks in the area where it primarily visits. Such a design rationale is similar to the phenomenon that people often know the traffic volume between places they visit a lot. We propose a fully distributed greedy packet routing algorithm that can realize efficient packet routing between landmarks in DTNs based on the local traffic map and the global landmark map. Extensive real trace based experiments demonstrate the efficiency of the proposed algorithm. The remaining of this paper is arranged as follows. Section II introduces related work. Section III presents the detailed system design. Section IV conducts performance evaluation through real trace driven experiments. Finally, Section V concludes the paper with remarks on our future work. II. RELATED WORK A. Packet Routing between Landmarks in DTNs Packet routing between landmarks in DTNs [] [] has been studied recently. The authors in [] observe the long term mobility pattern of each node and use such information to forward packets to nodes that frequently move to their destinations. GeoOpps [6] routes packets to geographical locations through vehicle networks. It always forwards packets to vehicles on the route with the smallest minimal estimated time of delivery (METD). In the work of [7], a packet is always forwarded to the node that has closer distance to its destination landmark. These methods mainly rely on nodes that are likely to visit the destination landmarks. When the number of such nodes is limited, the routing efficiency is also limited. In order to better utilize node mobility, researchers have proposed to forward packets in a landmark-by-landmark manner to reach the destination landmarks [] []. In LOUVER [], base stations are built on road intersections for packet relay. Vehicle mobility is then exploited to forward packets from one base station to another to reach the destination area. DTNFLOW [9] expands vehicle networks in LOUVER to general DTNs. It splits the network into sub-areas represented by landmarks. Then, predicted node mobility is used to carry packets from one landmark to another landmark. Geomob [] utilizes the global traffic distribution to forward packets to different areas through the landmark based relay. Above methods need either base stations or the global traffic distribution. These requirements can hardly be realized easily in DTNs. Such limitations constraint the feasibility of these methods. On the contrary, our method does not rely on any base stations and makes forwarding decisions locally, which is more suitable for distributed DTNs. B. Packet Routing between Nodes in DTNs There are already many algorithms for packet routing between nodes in DTN [] [9]. PROPHET [] updates two node s future meeting probability upon their encountering and ages it over time. It always forwards a packet to the node that has a higher probability of meeting its destination. RAPID [] and MaxContribution [] specify different packet forwarding and storage priorities to realize different routing performances, e.g., maximal success rate and minimal delay. The work in [] further propose to exploit transient contact patterns to select forwarder for more efficient packet routing. Considering that mobile device owners often belong to certain social networks, social networking properties have been utilized for packet routing in DTNs [] [9]. MOPS groups frequently encountered nodes as communities and assigns different roles to nodes with different community visiting patterns to facilitate the publish/subscribe service in DTNs. BUBBLE [6] first forwards a packet to the community that contains its destination and then routes the packet within the community. [7] considers both a node s centrality and its similarity with the packet destination to evaluate a node s suitability to carry the packet. The works in [] and [9] exploit fixed community and transient community structure in DTNs for efficient packet routing, respectively. III. SYSTEM DESIGN In this section, we first introduce the network modeling and design rationale. We then present how to construct the global

3 landmark map and the local traffic map. Finally, we introduce the detailed packet routing algorithm. A. Network Modeling and Design Goal We assume a DTN consisting of n nodes, denoted by N i (i [,n]). We also assume that the network is split into subareas, each of which is represented by a landmark. A landmark is often selected as the area where nodes gather together, such as a village in the rural area and a building on the campus. This means that the landmark is just the notation of an area and does not require any base stations to be built. We assume there are m landmarks, denoted by L j (j [,m]). Then, node mobility can be regarded as continuous transit between landmarks. We also assume that nodes present certain landmark visit patterns, which exists in many DTNs. For example, in DTNs consisting of mobile devices carried by people in rural areas or students on a campus, a person or a student may mainly transit between a few landmarks (i.e., villages or buildings). The goal of this paper is to realize efficient and distributed packet routing between identified landmarks in DTNs. This means that no infrastructures or global information is needed to support packet routing, and the packet forwarding decision is made locally. Such a function can support many interesting services or applications, such as data communication between rural villages, where infrastructures are too costly to build. B. Rationale of System Design In this work, we relay packets in a landmark-by-landmark manner to reach their destination landmarks. Such a strategy can better utilize node mobility for routing packet to landmarks. For example, suppose we need to forward packets from L to L 6. With the landmark based routing strategy, these packets are forwarded through a landmark path, say L L 6 L L 6. As a result, nodes moving between any two neighboring landmarks on the path, e.g., L and L 6, can forward these packets one step closer to destination L 6 even though these nodes rarely or never visit L 6. This means that more node mobility is utilized for packet routing between landmarks, leading to better routing efficiency. ) Challenges: The key problem in these methods is how to select a suitable landmark path for each packet. Recall that packets are carried by nodes to move from one landmark to another. This means that the more frequently nodes move from one landmark to a neighbor landmark, say L to L 6, the more quickly a packet can be forwarded from L to L 6, and the smaller the expected delay of this forwarding step. Then, we can calculate the expected delay of a landmark path as the sum of the expected delays on each hop and select the landmark path with the smallest expected delay for packet forwarding. However, how to find the landmark path with the smallest expected delay efficiently and accurately is non-trivial. This is because nodes often are sparsely distributed in DTNs. Previous methods [] [] realize this step by either building extra base stations on each landmark [], [9] or requiring that each node knows the global traffic distribution []. Unfortunately, both requirements cannot be satisfied easily in real DTNs. ) Our Solution: GreedyFlow routes packets through landmark path in a distributed manner. Without global information, GreedyFlow does not try to determine the whole relay path for each packet. Rather, it only selects the next-hop landmark for each packet based on the local information on current carrier to greedily route it to its destination landmark. To realize this goal, GreedyFlow builds a global landmark map and a local traffic map on each node, which represent the node s understanding of the landmark distribution in the network and node transition frequencies between landmarks in the area where the node primarily visits, respectively. The two maps help decide the next-hop landmark for each packet. Such a design rationale matches with our daily experiences. People usually know the traffic delays on roads connecting places they visit frequently and the general direction to reach a far-away unfamiliar place (e.g., in south or north). Then, people can use such knowledge to greedily relay a message to a far-away place efficiently. C. Global Landmark Map The global landmark map shows the distribution of landmarks in the network. It includes the GPS position of each landmark and the neighboring relationships between landmarks, i.e., the neighbor landmarks of each landmark. It is designed to ensure that packets are forwarded on the right direction towards their destination landmarks. The global landmark map is generated and maintained by the network administrator. When a DTN is deployed, the administrator selects landmarks in the network. It can collect the mobility information of nodes in the system to determine landmarks. When a node joins in the system, it first obtains the global landmark map from the network administrator. The global landmark map usually remains unchanged for a relative long period of time, which means that the global landmark map on each node does not need frequent updates. When the global landmark map changes, each node can obtain the updated version when it has access to the network administrator, e.g., when moving to a place with network connection. We split the network into sub-areas based on landmarks and let each landmark be responsible for the sub-area it resides in. The area between two landmarks is evenly split to the two neighboring sub-areas (i.e., the borderline passes through the midpoint of the line connecting the two landmarks and is perpendicular to it), as shown in Figure (a). Each sub-area is stored as the list of vertices in clockwise direction. When a node enters the sub-area of a landmark, we regard it as transiting to the landmark. As a result, node mobility can be summarized as consecutive transitions between landmarks. D. Local Traffic Map Each node maintains a local traffic map to record its knowledge about how frequently nodes transit between landmarks in the area where it primarily visits. It is designed to select the locally optimal landmark path on the direction to the destination landmark for packets carried by the node. Below, we first introduce how to determine the area a node visits

4 L L L L L6 (a) Global landmark map. L L L L L L 6 (b) Coverage of local traffic map. Fig. : Example of global landmark map and local traffic map coverage. Number of Landmarks 7 6 All Visits 7% of Visits Node Sequence Node Sequence (a) DART trace. (b) DNET trace. Fig. : Distribution of the # of visited landmarks. Number of Landmarks 6 All Visits 7% of Visits primarily, i.e., the coverage of the local traffic map, and then present how to construct the local traffic map on each node. ) Local Traffic Map Coverage: As previously introduced, the local traffic map helps determine the next-hop landmark on the path that can lead to the destination landmark quickly. Therefore, the more landmarks the local traffic map includes, the more likely that the next-hop landmark that can lead to smaller expected delay can be found. However, nodes often have limited storage resources, and the information dissemination often has a long delay in DTNs. This means that a node can neither store the node transit frequencies between all landmarks nor collects such information timely in DTNs. Therefore, we need to determine which landmarks to be included in the local traffic map. To solve this problem, we first examine how nodes visit landmarks in DTNs. We analyzed two real DTN traces: Dartmouth Campus Trace (DART) [] and DieselNet AP Trace (DNET) []. The former shows the association records of the WiFi access points (APs) and students devices on Dartmouth campus, while the latter includes the AP association records of buses in a college town (UMass). We preprocessed the trace to abstract landmarks, i.e., a building or an area with a certain size, from the two traces and merge neighboring records with the same device and landmark. Finally, the DART trace contains nodes and 9 landmarks, and the DNET trace has nodes and landmarks. We measured the total number of landmarks a node visits in the trace and the number of landmarks that account for 7% of a node s landmark visits in the trace. The test results with the two traces are shown in Figure (a) and Figure (b), respectively. We ranked nodes in descending order of the two metrics in the two figures. From the two figures, we find that more than % of nodes in the DART trace and all nodes in the DNET trace visit fewer than landmarks. This means that most nodes visit a few landmarks throughout the two traces. Besides, more than 9% of nodes in both traces spend their 7% of visits on fewer than landmarks. Such results demonstrate that nodes often only frequently transit between a limited number of landmarks. Therefore, we let the local traffic map of each node only include landmarks in the area where the node primarily visits. Specifically, each node ranks the landmarks in decreasing order of its visit frequencies and selects the first k landmarks that account for V f % of its total landmark visits. The area covered by these landmarks, i.e., the area covered by the most left-up landmark and the most right-bottom landmark, is defined as the coverage of the local traffic map. Figure (b) shows an example of the coverage of a local traffic map. In this example, the primarily visited landmarks are L, L, L 6, and. Then, the shadowed area is determined as the coverage of the local traffic map, which includes L, L, L, L, L 6, and. We can see that the larger V f is, the more information the local traffic map provides, but also the more overhead incurred. Therefore, a suitable V f can be determined based on the requirement on routing efficiency and overhead. ) Local Traffic Map Construction: Each node updates the local traffic map upon encountering other nodes. Specifically, suppose the coverage of a node s local traffic map is C i = {L a,l b,l c,l d }, {a, b, c, d} [,m], it queries each encountered node about how frequently it transits between these landmarks, i.e., from L x to L y, x, y {a, b, c, d} and x y. To enable such a function, each node builds an individual landmark transit table to record its transit frequencies between landmarks, as shown in Table I. Each row represents the node s transit frequency (i.e., how many transits per day) between two neighboring landmarks. The third column and the fourth column are the transit frequencies from L x to L y and from L y to L x, respectively. TABLE I: Landmark transit table. Landmark x Landmark y Frequency xy Frequency yx L L. L L 9 L L 7 Each node collects encountered nodes transit frequencies to update its local traffic map. For example, suppose a node s local traffic map contains landmark L and landmark L. Then, to get the overall transit frequency from L to L, the node gets every encountered node s transit frequency from L to L and sums up these transit frequencies. However, in this process, a node may meet another node and obtain its transit frequency multiple times. Then, to avoid summing up a node s transit frequency multiple times, each node maintains a record on which nodes transit frequencies have already been included in the calculation of the overall transit frequency from one landmark to another. We name such a record as the transit element table. Table II shows an example of transit element table on a node for the transition from L to L. The overall frequency in each transit element table finally is stored in the local traffic map. Table III shows the traffic

5 L L L TABLE II: Transit element table. Transit Node Frequency N.7 N L L N 7. Overall. L L 6 L Temp des. Des. L L L 6 (a) Temporary destination landmark. (b) Fastest path to the temp des. Fig. : Determining the next-hop landmark. L L Fastest path to temp des. map following the example in Figure (b). TABLE III: Local traffic map. L Landmark ID Neighbor Landmark Frequency L L. L L L 6 L 9 L. L L.. Temp des. Des. In summary, in GreedyFlow, when a node, say N i, meets another node, say N j, N i obtains N j s transit frequencies between each pair of landmarks covered in N i s local traffic map to update its local traffic map. In detail, for L x L y, if N j s transit frequency (denoted by fxy) j is not, N i first checks whether it has a transit element table for this transit. If not, it creates a transit element table for this transit with only one entry, i.e., the entry for N j. N i then updates N j s entry in the transit element map to fxy. j N i also updates the overall frequency for transit L x L y accordingly in both the transit element table and the local traffic map. For example, suppose a node s transit element table for L L is as shown in Table II, and its local traffic map is as shown in Table III. When the node meets N and finds that N s transit frequency for L L has changed to., it updates the entry for N in its transit element table to.. Then, it updates the overall transit frequency for L L to. in both the transit element table and the local traffic map. E. Packet Routing in GreedyFlow We introduce the packet routing algorithm in this section. We first give out the overview and then present details. ) Overview: The packet routing works in a greedy manner in GreedyFlow. When a node generates or receives a packet, it checks its local traffic map and the global landmark map to decide the next-hop landmark to forward the packet. Specifically, since a node s local traffic map may not include the destination landmark of the packet, it first selects a temporary destination landmark in the local traffic map that has the closest distance to the destination landmark. Each landmark s distance to the destination landmark is obtained from the global landmark map. This ensures that the packet forwarding is always on the right direction. We introduce this step in Section III-E. Then, the node finds the fastest path from current landmark to the temporary destination landmark based on the local traffic map and selects the next landmark on the path as the next-hop landmark. We introduce how to determine such a path in Section III-E. Figure (b) shows that the fastest path from L to temporary destination landmark is L L L 6 and the next-hop landmark is L. Then, the packet is forwarded to the selected next-hop landmark L. In detail, the node queries its neighbors about where they are predicted to move to and forwards the packet to the node that is predicted to move to the selected nexthop landmark L. The details on how each node predicts the next landmark it is going to transit to is introduced in Section III-E. When the node arrives at L, it repeats the above process to further forward the packet. Finally, the packet is greedily forwarded toward its destination landmark. However, a node that is predicted to move to the next-hop landmark may not always be found. A node may not always move to the predicted landmark. A packet may revisit the same landmark during the forwarding. We discuss how to handle these exceptions in Section III-E. ) Selecting Temporary Destination Landmark: The packet carrier first checks whether its local traffic map contains the destination landmark of the packet or not. If yes, the temporary destination landmark is the destination landmark. Otherwise, the temporary destination landmark is the landmark in the local traffic map that has the closest distance to the destination landmark. The distance between two landmarks is calculated as the minimal number of landmark hops between them. As shown in Figure (a), suppose the destination landmark is L, landmark is selected as the temporary destination landmark since it has the closest distance to L. ) Determine the Fastest Path to the Temporary Destination: As introduced in Section III-B, the expected delay to a forwarding hop is determined by the frequency of node transition on the hop. We use such a property to find the fastest path to the temporary destination landmark. For better illustration, we abstract each landmark as a circle and two circles are connected if they represent two neighbor landmarks. We also abstract the node transition from one landmark to another landmark as a link connecting the two landmarks. Therefore, two neighbor circles are connected by two links in two direction. Each link has a weight, which represents the delay to forward a packet through the link. It is calculated as /f t, where f t is the frequency of node transition in the direction of the link. Figure (a) shows the abstracted local traffic map. Using such a graph, the problem of finding the fastest path to the temporary destination landmark turns into the problem of finding the shortest path to the temporary destination

6 Current L L L.. landmark L.6 L. Temp des. 6 landmark Current landmark L L L... L L 6 Temp des. landmark (a) Abstracted local traffic map. (b) The selected fastest path. Fig. : Determine the fastest path to the temporary destination. landmark. We use the Dijkstra algorithm [] to fulfill this task. In detail, we take the current landmark L as the root. We then calculate its shortest paths to all nodes iteratively until the shortest path to the temporary destination landmark is found. The bold links in Figure (b) show the fastest path from L to. Finally, the node selects the next landmark on the path as the next-hop landmark, i.e., L. ) Predicting Node Mobility: In order to forward a packet from current landmark to the determined next-hop landmark, the current packet holder queries its neighbors about where they are most likely to transit to and forwards the packet to the node that is going to move to the next-hop landmark. To fulfill this function, each node predicts its next transit upon moving to a new landmark. In detail, each node uses its historical landmark visit information to feed the Order- Markov predictor to deduce the landmark it is going to transit to. In detail, suppose a node s landmark visit history can be represented by V H = L x L x L x L xn L xn. Then, the probability that the node is going to visit landmark L xn+ can be calculated by where Pr(L xn L xn+ L xn L xn )= Pr(Lx n Lxn Lx ) n+, () Pr(L xn L xn ) Pr(L xn L xn L xn+ )= N(Lx n Lxn L xn+ ) () N(All ) and Pr(L xn L xn )= N(Lx n Lxn ) () N(All ) Note that N(L xn L xn L xn+ ) denotes the number of times that the node visits landmarks L xn, L xn, and L xn+ consecutively, N(L xn L xn ) denotes the number of times that the node visits landmarks L xn and L xn consecutively, and N(All k ) (k =, ) means the number of visits on consecutive k landmarks in history. Then, the landmark that leads to the largest transit probability in Equation () is selected as the landmark that the node is going to move to. ) Handle Exceptions: We further design three additional schemes to handle three exception cases. Firstly, a node that is expected to transit to the next-hop landmark for a packet cannot be found. Secondly, the packet carrier moves to a landmark that is different from the predicted one. To handle the first exception, we simply let the current carrier of the packet continue carrying it until arriving at another landmark. If this landmark is the next-hop landmark of the packet, the exception is solved automatically. Otherwise, the first exception turns into the second exception: the carrier moves to an unexpected landmark. For this exception, the current carrier checks whether a node that is predicted to move to the next-hop landmark of the packet can be found. If yes, it forwards the packet to the node. Otherwise, it forwards the packet to the neighbor node that has the highest centrality, which handles the packet as mentioned in Sections III-E, III-E, III-E. The centrality of a node is defined as the number of nodes it can meet in a unit time. We select such a node to carry the packet since it can meet more nodes and thus has more options on forwarder selection. 6) Summary: We summarize the process of packet routing in GreedyFlow as follows. When a node generates a packet or carries a packet to its next-hop landmark, the node follows the method introduced in Section III-E to determine its temporary destination landmark. The node determines the fastest path to the temporary destination landmark based on its local traffic map and selects the next-hop landmark for the packet by following the method in Section III-E Then, the node checks whether a neighbor node is predicted to move to the next-hop landmark. If yes, it forwards the packet to the neighbor node. The prediction of node transition is introduced in Section III-E. If no suitable carrier can be found or the selected carrier moves to a landmark other than the next-hop landmark, the packet is handled by the schemes in Section III-E. The above process repeats until the packet arrives at the destination landmark. IV. FORMANCE EVALUATION We conducted event driven experiments with the two real traces, namely Dartmouth campus trace (DART) [] and DieselNet AP trace (DNET) [], to evaluate the performance of the GreedyFlow in comparison with three state-of-art methods. Section III-D introduces the two traces. A. Experiment Settings We compared GreedyFlow with three representative DTN routing algorithms: Geomob [], [] and []. Geomob is similar to GreedyFlow that it also routes packets in a landmark-by-landmark manner. However, it requires that all nodes know the traffic distribution in the network to decide the landmark path for each packet. As mentioned in the introduction, such a requirement is not practical. We still use it to measure whether GreedyFlow can lead to comparable performance with Geomob. estimates each node s probabilities to visit each landmark and forwards packets to nodes that have a high probability to visit their destination landmarks before they expire. evaluates a node s suitability to carry a packet by considering both its centrality and its visit frequency with the packet s destination landmark. In the experiment, we used the first / of both traces for initialization, in which nodes build the local traffic map in GreedyFlow and accumulate related metrics, e.g., landmark visit frequencies, in comparison methods. After this step, we

7 Success Rate Average Delay (x s) 9 Forwarding Cost (x 6 ) 6 6 Maintenance Cost (x 7 ) 7 6 (a) Success rate. (b) Average delay. (c) Forwarding cost. Fig. 6: Performance with different packet rates using the DART trace. (d) Maintenance cost. Success Rate Average Delay (x s) Forwarding Cost (x ) Maintenance Cost (x 6 ) (a) Success rate. (b) Average delay. (c) Forwarding cost. Fig. 7: Performance with different packet rates using the DNET trace. (d) Maintenance cost. generated packets with randomly selected destination landmarks at the rate of r p packets per landmark per day. The TTL (Time to Live) of each packet was set to days in the DART trace and 6 days in the DNET trace. When a packet s TTL expires, it is dropped directly. We assume that each packet has the same size of KB and the available storage on each node is m n KB. We set r p and m n to and by default and varied them for extensive performance evaluation. When the storage on a node is full, the oldest packet is dropped. We set V f to 7 since we find that it is sufficient for efficient packet routing. We set the confidence interval to 9%. We used four metrics in the experiments: success rate, average delay, forwarding cost, and maintenance cost. The success rate refers to the percentage of packets that have been successfully delivered within the TTL. The average delay refers to the average delay of successfully delivered packets. The forwarding cost refers to the number of packet forwarding operations. The maintenance cost refers to the number of messages exchanged between nodes to support packet routing (e.g., transit information in GreedyFlow and landmark visit frequencies in comparison methods). B. Performance with Different Packet Rates We first conduct performance evaluation with different packet rates (r p ). We varied r p from to in the test. ) Success Rate: Figures 6(a) and 7(a) show the success rates of the four methods in the experiments with different packet rates using the DART trace and the DNET trace, respectively. We see from the two figures that the success rates follow: Geomob GreedyF low>. Geomob and GreedyFlow lead to higher success rate than the other two methods because they forward packets in a landmark-by-landmark manner, thereby better utilizing node mobility for more efficient packet routing. Such a result demonstrates the advantage of the landmark path based routing strategy in routing packets to different landmarks. GreedyFlow shows slightly lower success rate than Geomob. This is because nodes in Geomob are assumed to know the global traffic distribution beforehand, while nodes in GreedyFlow only know the traffic distribution in the area they often visit. However, the assumption in Geomob is not practical in real DTNs. We see that the difference on success rate is very marginal. This means that GreedyFlow can also effectively select a fast landmark path for each packet even without the global information. In other words, the performance of the distributed GreedyFlow is comparable to that of Geomob. We also find that shows slightly higher success rate than. This is because considers not only a node s visiting frequency with the destination landmark but also its centrality in the network, while only considers the visit frequency. Then, in addition to nodes that frequently visit packet destinations, also utilizes nodes with a high centrality to route packets. As a result, utilizes more mobile nodes for routing, leading to higher success rate. ) Average Delay: Figures 6(b) and 7(b) show the average delays of the four methods in the experiments with different packet rates using the DART trace and the DNET trace, respectively. We find from the two figures that the average delays follow: Geomob<GreedyF low<<p ER. Geomob has the least average delay because each node knows the global traffic distribution, which enables it to always select the landmark path with the minimal expected delay for each packet. In GreedyFlow, each node only knows the node transit frequencies between landmarks in the area where it primarily visits. Therefore, it has slightly higher average delay than Geomob. However, we see that the difference is very

8 small. Since GreedyFlow does not require the global traffic information as Geomob, it is more suitable for DTNs. and exhibit much higher average delay than Geomob and GreedyFlow. This is because they rely on nodes that frequently visit destination landmarks for packet routing, and such nodes may not always exist. On the contrary, Geomob and GreedyFlow forward packets in the landmark-by-landmark manner to reach their destinations. Nodes that rarely visit the destination landmark of a packet can still be utilized to forward it to a landmark closer to the destination landmark, leading to a small average delay of successfully delivered packets. ) Forwarding Cost: Figures 6(c) and 7(c) show the forwarding costs of the four methods in the experiments with different packet rates using the DART trace and the DNET trace, respectively. We find from the two figures that the forwarding costs follow: Geomob>GreedyF low>>p ER. generates the least packet forwarding cost because it only forwards a packet to the node that has a high probability of delivering the packet before it expires, leading to few forwarding opportunities. works in a similar manner as but additionally considers centrality for forwarder selection, resulting in more packet forwarding than. GreedyFlow and Geomob generate more packet forwarding cost than and because they forward packets in a landmark-by-landmark manner, which exploits more nodes to carry packets. However, we can see that the increase of forwarding cost is not significant, which is worthwhile considering their improvement on routing efficiency. ) Maintenance Cost: Figures 6(d) and 7(d) show the maintenance costs of the four methods in the experiments with different packet rates using the DART trace and the DNET trace, respectively. We see from the two figures that the maintenance costs follow: GreedyF low>>p ER>Geomob. GeoMob generates the least maintenance cost because it assumes that nodes already know the global traffic distribution beforehand. Therefore, nodes only need to exchange their probabilities of going to neighbor landmarks to support packet routing. In, encountering nodes exchange their probabilities to visit all landmarks to determine packet forwarders, leading to more maintenance cost than Geomob. In addition to landmark visit frequencies, nodes in also exchange centrality information. Therefore, it has higher maintenance cost than. GreedyFlow has more maintenance cost than others because nodes need to exchange transit frequencies for local traffic map update. However, we see that the maintenance cost of GreedyFlow is on the same level with others. Combining all above results, we conclude that the two methods that forward packets through landmark paths lead to better performance than other methods. Such a result justifies the correctness of such a packet routing strategy. We also see that GreedyFlow shows close performance with Geomob, which however requires global traffic distribution. Such a result demonstrates that GreedyFlow can realize efficient packet routing in a fully distributed manner. C. Performance with Different Memory Sizes We further evaluate the performance of the four methods with different memory sizes on each node (m n ). We varied m n from to in the test. ) Success Rate: Figures (a) and 9(a) illustrate the success rates of the four methods in the experiments with different memory sizes using the DART trace and the DNET trace, respectively. We see from the two figures that the success rates follow: Geomob GreedyF low>. Such a result is consistent with those in Figures 6(a) and 7(a) for the same reasons. We also find that when the memory size on each node increases, the success rates of all methods increase. This is because when the memory size increases, each node can carry more packets. This means that the capacity of the network is enhanced, leading to more successful packets. ) Average Delay: Figures (b) and 9(b) plot the average delays of the four methods in the experiments with different memory sizes using the DART trace and the DNET trace, respectively. We find from the two figures that the average delays follow: Geomob<GreedyF low<<p ER. We see that this relationship is the same as in Figures 6(b) and 7(b) due to the same reasons. Similarly, we see that when the memory size on each node increases, the average delays of all methods decrease. This is because when the memory size increases, more packets can be carried by nodes that are most likely to deliver them to their destinations, thereby reducing the average delay of successfully delivered packets. ) Forwarding Cost: Figures (c) and 9(c) show the forwarding costs of the four methods in the experiments with different memory sizes using the DART trace and the DNET trace, respectively. The two figures show that the average forwarding costs follow: Geomob>GreedyF low> >P ER. Again, this is the same as in Figures 6(c) and 7(c) due to the same reasons. We also find that when the memory size increases, the forwarding costs of all methods increase. This is because when each node can carry more packets, there are more packet forwarding. ) Maintenance Cost: Figures (d) and 9(d) show the maitenance costs of the four methods in the experiments with different memory sizes using the DART trace and the DNET trace, respectively. The two figures show that the maintenance costs follow: GreedyF low>>p ER>Geomob We can find that this relationship is the same as in Figures 6(d) and 7(d). Also, the maintenance costs remain unchanged with different packet rates or memory sizes. This is because the maintenance costs of these methods are only affected by the number of node encountering. Since we use the same traces in the each test, the maintenance costs remain the same. The results with different memory sizes further confirm the superior performance of GreedyFlow. V. CONCLUSION Data transmission between different places (landmarks) in a DTN can be used in many applications. However, previous algorithms on packet routing between landmarks either cannot achieve high efficiency or have impractical requirements. In 6

9 Success Rate Average Delay (x s) 6 Forwarding Cost (x 6 ) 6 Maintenance Cost (x 7 ) 7 6 (a) Success rate. (b) Average delay. (c) Forwarding cost. Fig. : Performance with different memory sizes using the DART trace. (d) Maintenance cost. Success Rate Average Delay (x s) Forwarding Cost (x ) 6 Maintenance Cost (x 6 ) (a) Success rate. (b) Average delay. (c) Forwarding cost. Fig. 9: Performance with different memory sizes using the DNET trace. (d) Maintenance cost. this paper, we propose a novel algorithm, namely GreedyFlow, to route packets between landmarks in DTNs in a fully distributed manner. To better utilize node mobility, GreedyFlow forwards packets in a landmark-by-landmark manner to let them gradually reach their destination landmarks. Each node collects node transit frequencies between landmarks in the area it primarily visits and uses such information to build a local traffic map. A global landmark that shows the distribution of landmarks is also built on each node off-line. The two maps are used to greedily forward packets toward their destination landmarks. Extensive real trace driven experiments show that GreedyFlow has better performance than state-of-art routing algorithms and can achieve performance comparable to the routing algorithm that requires the global traffic information on each node. In the future, we plan to further enhance routing efficiency by considering social communities in DTNs. ACKNOWLEDGEMENTS This research was supported in part by U.S. NSF grants NSF-9, IIS-, CNS-6, CNS-96, Microsoft Research Faculty Fellowship 7. REFERENCES [] S. Jain, K. R. Fall, and R. K. Patra, Routing in a delay tolerant network, in Proc. of SIGCOMM,. [] K. Fall, A delay-tolerant network architecture for challenged internets, in Proc. of SIGCOMM,. [] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet, in Proc. of ASPLOS-X,. [] U. Weinsberg, A. Balachandran, N. Taft, G. Iannaccone, V. Sekar, and S. Seshan, CARE: Content aware redundancy elimination for disaster communications on damaged networks, CoRR,. [] J. Kurhinen and J. Janatuinen, Geographical routing for delay tolerant encounter networks, in Proc. of ISCC, 7. [6] I. Leontiadis and C. Mascolo, GeOpps: Geographical opportunistic routing for vehicular networks, in Proc. of WOWMOM, 7. [7] J. Lebrun, C. nee Chuah, D. Ghosal, and M. Zhang, Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks, in Proc. of VTC,. [] K. C. Lee, M. Le, J. HŁrri, and M. Gerla, LOUVRE: Landmark overlays for urban vehicular routing environments. in Proc. of VTC Fall,. [9] K. Chen and H. Shen, DTN-FLOW: Inter-landmark data flow for highthroughput routing in DTNs. in Proc. of IPDPS,. [] L. Zhang, B. Yu, and J. Pan, GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses. in Proc. of INFOCOM,. [] A. Lindgren, A. Doria, and O. Schelén, Probabilistic routing in intermittently connected networks. Mobile Computing and Communications Review, vol. 7, no.,. [] A. Balasubramanian, B. N. Levine, and A. Venkataramani, DTN routing as a resource allocation problem. in Proc. of SIGCOMM, 7. [] K. Lee, Y. Yi, J. Jeong, H. Won, I. Rhee, and S. Chong, Max- Contribution: On optimal resource allocation in delay tolerant networks. in Proc. of INFOCOM,. [] W. Gao and G. Cao, On exploiting transient contact patterns for data forwarding in delay tolerant networks. in Proc. of ICNP,. [] F. Li and J. Wu, MOPS: Providing content-based service in disruptiontolerant networks, in Proc. of ICDCS, 9. [6] P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap: social-based forwarding in delay tolerant networks, in Proc. of MobiHoc,. [7] E. M. Daly and M. Haahr, Social network analysis for routing in disconnected delay-tolerant MANETs, in Proc. of MobiHoc, 7. [] J. Wu, M. Xiao, and L. Huang, Homing spread: Community homebased multi-copy routing in mobile social network, in Proc. of INFO- COM,. [9] X. Zhang and G. Cao, Transient community detection and its application to data forwarding in delay tolerant networks. in Proc. of ICNP,. [] T. Henderson, D. Kotz, and I. Abyzov, The changing usage of a mature campus-wide wireless network, in Proc. of MOBICOM,. [] A. Balasubramanian, B. N. Levine, and A. Venkataramani, Enhancing interactive web applications in hybrid networks, in Proc. of MOBICOM,. [] E. W. Dijkstra, A note on two problems in connexion with graphs, Numerische Mathematik, 99. [] Q. Yuan, I. Cardei, and J. Wu, Predict and relay: an efficient routing in disruption-tolerant networks. in Proc. of MobiHoc, 9. [] E. M. Daly and M. Haahr, Social network analysis for routing in disconnected delay-tolerant MANETs, in MobiHoc, 7. 7

TSearch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties

TSearch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties earch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties Li Yan, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1. DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs

IEEE/ACM TRANSACTIONS ON NETWORKING 1. DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs IEEE/ACM TRANSACTIONS ON NETWORKING 1 DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs Kang Chen, Student Member, IEEE, and Haiying Shen, Senior Member, IEEE, Member, ACM Abstract

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 TSearch: Target-Oriented Low-Delay Node Searching in DTNs With Social Network Properties Li Yan, Student Member, IEEE, Haiying Shen, Senior Member, IEEE, Member, ACM,

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace

More information

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 9631 Email:

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs : A Distributed Adaptive-Learning Routing Method in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2, shenh,

More information

Exploiting Active Sub-areas for Multi-copy Routing in VDTNs

Exploiting Active Sub-areas for Multi-copy Routing in VDTNs Exploiting Active Sub-areas for Multi-copy Routing in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2,

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness 1 Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness Kang Chen, Haiying Shen, Senior Member, IEEE,, Li Yan Abstract Distributed file searching in delay tolerant

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Routing in Large-Scale Buses Ad Hoc Networks

Routing in Large-Scale Buses Ad Hoc Networks 1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks 1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Globecom 2012 - Wireless Networking Symposium Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Xiaoyan Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang Department of Computer

More information

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 29631

More information

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois

More information

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention*

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention* MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention* Kang Chen 1 and Haiying Shen 2 1 Dept. of ECE, Southern Illinois University, IL, USA 2 Dept.

More information

MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks

MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks Li Yan, Haiying Shen and Kang Chen ACM/IEEE IoTDI Pittsburgh, USA April 2017 Playground

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention : Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention Kang Chen # Department of Electrical and Computer Engineering Southern Illinois University, Carbondale,

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing

Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing 1 Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing Kang Chen, Student Member, IEEE, Haiying Shen*, Senior Member, IEEE, Li Yan Abstract In Delay

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK 1 MARATI ESHWARI, 2 P.SRINIVAS 1 M. Tech Student, Department of IT, Joginpally B R Engineering College, Village Yenkapally,

More information

Delay-Differentiated Gossiping in Delay Tolerant Networks

Delay-Differentiated Gossiping in Delay Tolerant Networks Delay-Differentiated Gossiping in Delay Tolerant Networks Parameswaran Ramanathan and Aarti Singh Department of Electrical and Computer Engineering University of Wisconsin-Madison parmesh@ecewiscedu, singh@caewiscedu

More information

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Clemson University TigerPrints All Dissertations Dissertations 8-2014 Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Kang Chen Clemson University, kangc@g.clemson.edu

More information

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath

More information

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs : Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks

Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks Dongsheng Wei [, Konglin Zhu \, and Xin Wang [ [ School of Computer Science, Fudan University, Shanghai, China Engineering Research

More information

Modeling Redundancy-based Routing in Delay Tolerant Networks

Modeling Redundancy-based Routing in Delay Tolerant Networks Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline Yasuhiro Ishimaru *, Weihua Sun *, Keiichi Yasumoto * and Minoru Ito * * Graduate School of Information Science, Nara Institute

More information

Detecting Wormhole Attacks in Delay Tolerant Networks

Detecting Wormhole Attacks in Delay Tolerant Networks Detecting Wormhole Attacks in Delay Tolerant Networks Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen Dept. of ECE, Stevens Institute of Technology Dept. of CSE, Lehigh University Castle Point on

More information

HCS: hierarchical cluster-based forwarding scheme for mobile social networks

HCS: hierarchical cluster-based forwarding scheme for mobile social networks Wireless Netw (2015) 21:1699 1711 DOI 10.1007/s11276-014-0876-x HCS: hierarchical cluster-based forwarding scheme for mobile social networks Sun-Kyum Kim Ji-Hyeun Yoon Junyeop Lee Sung-Bong Yang Published

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara

More information

Overhead Reduction In Delay Tolerant Networks

Overhead Reduction In Delay Tolerant Networks Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical

More information

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr.

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr. Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc 2009 Presentor: Mingyuan Yan Advisor: Dr. Yingshu Li 1 2 3 4 5 Introduction Problem definition Single-data multicast

More information

DTN Routing in Vehicular Sensor Networks

DTN Routing in Vehicular Sensor Networks DTN Routing in Vehicular Sensor Networks Xu Li, Wei Shu, Minglu Li, Hongyu Huang and Min-You Wu Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China Department

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

Some Routing Challenges in Dynamic Networks

Some Routing Challenges in Dynamic Networks Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications

More information

Data Management Issues in Disconnected Sensor Networks

Data Management Issues in Disconnected Sensor Networks Data Management Issues in Disconnected Sensor Networks Wolfgang Lindner MIT CSAIL wolfgang@csail.mit.edu Samuel Madden MIT CSAIL madden@csail.mit.edu Abstract: The possibility of disconnection is one of

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

TOUR: Time-sensitive Opportunistic Utility-based Routing in Delay Tolerant Networks

TOUR: Time-sensitive Opportunistic Utility-based Routing in Delay Tolerant Networks : Time-sensitive Opportunistic Utility-based Routing in Delay Tolerant Networks Mingjun Xiao, Jie Wu, Cong Liu, and Liusheng Huang School of Computer Science and Technology / Suzhou Institute for Advanced

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Comparative Study of Routing Protocols for Opportunistic Networks

Comparative Study of Routing Protocols for Opportunistic Networks Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks : An Efficient Method for Content Transmission in Mobile Social Networks ABSTRACT Ning Wang Dept. of Computer and Information Sciences Temple University Philadelphia PA 9 ning.wang@temple.edu In Mobile

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

Opportunistic Networks: A Review

Opportunistic Networks: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

Reliable Routing for Roadside to Vehicle Communications in Rural Areas

Reliable Routing for Roadside to Vehicle Communications in Rural Areas Reliable Routing for Roadside to Vehicle Communications in Rural Areas Shen Wan, Jian Tang and Richard S. Wolff Abstract The demands for vehicular Internet access are proliferating. Access Points (APs)

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Histogram-Based Density Discovery in Establishing Road Connectivity

Histogram-Based Density Discovery in Establishing Road Connectivity Histogram-Based Density Discovery in Establishing Road Connectivity Kevin C. Lee, Jiajie Zhu, Jih-Chung Fan, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,

More information

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

Presenter: Wei Chang4

Presenter: Wei Chang4 Quan Yuan1, Ionut Cardei2, Jing Chen3, and Jie Wu4 Presenter: Wei Chang4 University of Texas-Permian Basin1, Florida Atlantic University2 Wuhan University3,Temple University4 } Background } Motivation

More information

Social-Aware Data Forwarding through Scattered Caching in Disruption Tolerant Networks

Social-Aware Data Forwarding through Scattered Caching in Disruption Tolerant Networks Social-Aware Data Forwarding through Scattered Caching in Disruption Tolerant Networks HyunAe Kim and HyungJune Lee Department of Computer Science and Engineering Ewha Womans University, Seoul, South Korea

More information

PeopleRank: Social Opportunistic Forwarding

PeopleRank: Social Opportunistic Forwarding PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Routing in a Delay Tolerant Network

Routing in a Delay Tolerant Network Routing in a Delay Tolerant Network Vladislav Marinov Jacobs University Bremen March 31st, 2008 Vladislav Marinov Routing in a Delay Tolerant Network 1 Internet for a Remote Village Dial-up connection

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

MOPS: Providing Content-based Service in Disruption-tolerant Networks

MOPS: Providing Content-based Service in Disruption-tolerant Networks : Providing Content-based Service in Disruption-tolerant Networks Feng Li and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract Content-based service,

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Aware and Anonymous Location Based Efficient Routing Protocol Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering

More information

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332

More information